Large scale secular registry or surveillance systems have been accumulating vast data that allow mathematical modeling of cancer incidence and mortality rates. Most contemporary models in this regard use time series and APC (age-period-cohort) methods and focus primarily on predicting or analyzing cancer epidemiology with little attention being paid to implications for designing cancer registry, surveillance or evaluation initiatives. This research models age-specific cancer incidence rates using logistic growth equations and explores their performance under different scenarios of data completeness in the hope of deriving clues for reshaping relevant data collection. The study used China Cancer Registry Report 2012 as the data source. It employed 3-parameter logistic growth equations and modeled the age-specific incidence rates of all and the top 10 cancers presented in the registry report. The study performed 3 types of modeling, namely full age-span by fitting, multiple 5-year-segment fitting and single-segment fitting. Measurement of model performance adopted adjusted goodness of fit that combines sum of squred residuals and relative errors. Both model simulation and performance evalation utilized self-developed algorithms programed using C# languade and MS Visual Studio 2008. For models built upon full age-span data, predicted age-specific cancer incidence rates fitted very well with observed values for most (except cervical and breast) cancers with estimated goodness of fit (Rs) being over 0.96. When a given cancer is concerned, the R valuae of the logistic growth model derived using observed data from urban residents was greater than or at least equal to that of the same model built on data from rural people. For models based on multiple-5-year-segment data, the Rs remained fairly high (over 0.89) until 3-fourths of the data segments were excluded. For models using a fixed length single-segment of observed data, the older the age covered by the corresponding data segment, the higher the resulting Rs. Logistic growth models describe age-specific incidence rates perfectly for most cancers and may be used to inform data collection for purposes of monitoring and analyzing cancer epidemic. Helped by appropriate logistic growth equations, the work vomume of contemporary data collection, e.g., cancer registry and surveilance systems, may be reduced substantially.
Journal of the Korean Society for information Management
/
v.26
no.2
/
pp.27-41
/
2009
With explosive growth in the area of the Internet and IT services, various types of digital contents are generated and circulated, for instance, as converted into digital-typed, secure electronic records or reports, which have high commercial value, e-tickets and so on. However, because those digital contents have commercial value, high-level security should be required for delivery between a consumer and a provider with non face-to-face method in online environment. As a digital contents, an e-ticket is a sort of electronic certificate to assure ticket-holder's proprietary rights of a real ticket. This paper focuses on e-ticket as a typical digital contents which has real commercial value. For secure delivery and use of digital contents in on/off environment, this paper proposes that 1) how to generate e-tickets in a remote e-ticket server, 2) how to authenticate a user and a smart card holding e-tickets for delivery in online environment, 3) how to save an e-ticket transferred through network into a smart card, 4) how to issue and authenticate e-tickets in offline, and 5) how to collect and discard outdated or used e-tickets.
Sporulation in the fission yeast Schizosaccharomyces pombe has been regarded as an important model of cellular development and differentiation. S. pombe cells proliferate by mitosis and binary fission on growth medium. Deprivation of nutrients especially nitrogen sources, causes the cessation of mitosis and initiates sexual reproduction by malting between two sexually compatible cell types. Meiosis is then followed in a diploid cell in the absence of nitrogen source. DNA fragment complemented with the mutations of sporulation gene was isolated from the S. pombe gene library constructed in the vector, pDB 248' and designated as pDB (spo 5)1. We futher analyzed six recombinant plasmids, pDB (spo 5)2, pDB(spo 5)3, pDB(spo 5)4, pDB(spo 5)5, pDB(spo 5)6, pDB(spo 5)7, and found each plasmids is able to rescue the spo 5-2, spo 5-3, spo 5-4, spo 5-5, spo 5-6, spo 5-7, mutations, respectively. Mapping of the integrated plasmid into the homologous site of the S. pombe chromosomes demonstrated that pDB (spo 5)1, and pDB (spo 5)R1 contained the spo 5 gene. Transcipts of spo 5 gene were analyzed by Northern hybridization. Two transcripts of 3.2 kb and 25 kb were detected with 5 kb Hind III fragment containing a part of the spo 5 gene as a probe. The small mRNA (2.5 kb) appeared only when a wild-type strain was cultured in the absence of nitrogen source in which condition the large mRNA (3.2 kb) was produced constitutively. Appearance of a 2.5 kb spo 5-mRNA depends upon the function of the mei1, mei2 and mei3 genes.
Journal of the Korean Society for information Management
/
v.24
no.4
/
pp.53-72
/
2007
This study is designed to assess whether storyboard surrogates are useful enough to be utilized for indexing sources as well as for metadata elements using 12 sample videos and 14 participants. Study shows that first, the match rates of index terms and summaries are significantly different according to video types, which means storyboard surrogates are especially useful for the type of videos of conveying their meanings mainly through images. Second, participants could assign subject keywords and summaries to digital video, sacrificing a little loss of full video clips' match rates. Moreover, the match rate of index terms (0.45) is higher than that of summaries (0.40). This means storyboard surrogates could be more useful for indexing videos rather than summarizing them. The study suggests that 1)storyboard surrogates can be used as sources for indexing and abstracting digital videos; 2) using storyboard surrogates along with other metadata elements (e.g., text-based abstracts) can be more useful for users' relevance judgement; and 3)storyboard surrogates can be utilized as match sources of image-based queries. Finally, in order to improve storyboard surrogates quality, this study proposes future studies: constructing key frame extraction algorithms and designing key frame arrangement models.
Bae, Ji Min;Kim, Dae Hun;Kim, Jae Kyu;Lee, Byung Ryul;Yang, Gi Young;Kim, Kun Hyung
Journal of Acupuncture Research
/
v.32
no.4
/
pp.147-156
/
2015
Objectives : This study aims to evaluate the effectiveness and safety of Korean medicine for a thoracolumbar compression fracture. Methods : We searched six Korean databases (DBPIA, Korean Studies Information Service System, Oriental Medicine Advanced Searching Integrated System, National Digital Science Library, Research Information Sharing Service, KoreaMed) (up to June 2015) and the Journal of Korean Acupuncture and Moxibustion Society. Unpublished studies were also searched. Clinical research, other than case reports involving less than 10 patients, were eligible. The effectiveness and safety of Korean Medicine was analyzed. The 'Risk of Bias' was assessed using the 'Risk of Bias' assessment tool for non-randomized studies as well as the Cochrane Collaboration's 'Risk of Bias' tool. Results : We found 12 before-after studies (374 patients). There was no randomized trial. All studies combined at least three different types of Korean medicine treatments. The period of treatment varied between less a week and 154 days. All the included studies reported improvements in pain, functional disability related to lower back pain, global assessment, and benefits in the compression ratio of a fractured vertebrae and skin temperature measured by digital infrared thermal imaging in comparison with the baseline. However, all studies had a high risk of bias and three studies reported mild adverse events. Conclusions : There is no randomized trial for the role of Korean medicine for patients with a thoracolumbar compression fracture. The effectiveness and safety of Korean medicine for this population remains unclear. Findings in this review are seriously biased due to observational design and a high risk of bias included in the studies. Future high-quality randomized trials are warranted.
Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.
Even though three isotypes of thioredoxins (-f, -m and -h types) have been identified in a variety of plant cells, there are only a few reports on thioredoxin-h that were recently identified. In this study, a cDNA encoding a h-type of thioredoxin was isolated from a cDNA library of Chinese cabbage, and named here CTrx-h. An open reading frame of the gene contained a polypeptide of 133 amino acids with a conserved active center, WCGPC, which appeared in all of the thioredoxin proteins. A deduced amino acid sequence of the CTrx-h showed the highest sequence identity with those of Arabidopsis thioredoxin-h2 (75.2%) and thioredoxin-h5 (46.6%) proteins, but it shared a low sequence homology to other isotypes of plant thioredoxinm and thioredoxin-f. The CTrx-h protein that is expressed in E. coli represented not only an insulin reduction activity, but also electron transferring activity from NADPH to thioredoxin-dependent peroxidase. A genomic Southern blot analysis using the cDNA insert of CTrx-h revealed that the gene consisted of a small multigene family in Chinese cabbage genome. On the contrary to other thioredoxin-h proteins that were widely distributed in most tissues of the plant, the CTrx-h was predominantly expressed in flowers. The expression was very low in other tissues. The data of the Northern blot analysis suggests that the CTrx-h may have other functions in flower development or differentiation, in addition to its defensive role.
Journal of the Korea Academia-Industrial cooperation Society
/
v.20
no.12
/
pp.60-68
/
2019
For effective building maintenance, the collection and management of various maintenance date such as work history information and material information is required. Despite the introduction of information management technologies and systems to reduce the amount of maintenance work of buildings, which have become larger and more complex, the maintenance information is not being utilized properly. As an alternative, research on the introduction and utilization of BIM is being conducted continuously. However, the BIM models generated at the design phase are not utilized in practice due to a lack of architectural maintenance information. This study proposed a COBie document prototype to support BIM-based smart maintenance tasks performed by building managers. In order to formalize various types of maintenance work procedures, a BIM-based maintenance process model is presented in two categories: inspection and maintenance. Among the BIM attribute data of the BIM model generated at the design phase, the parameters corresponding to the maintenance necessary information for each basic process are derived. Based on this, we proposed a COBie document prototype consisting of seven spreadsheets. The results of a case study confirmed that the KBIMS library-based BIM model created at the design phase without the maintenance information can be used at the maintenance phase.
The Journal of Korean Institute of Communications and Information Sciences
/
v.30
no.5C
/
pp.344-354
/
2005
In this paper, we proposed a new lifting architecture for JPEG2000 and implemented to ASIC. We proposed a new cell to execute unit calculation of lifting using the property of lifting which is the repetitious arithmetic with same structure, and then recomposed the whole lifting by expanding it. After the operational sequence of lifting arithmetic was analyzed in detail and the causality was imposed for implementation to hardware, the unit cell was optimized. A new lifting kernel was organized by expanding simply the unit cell, and a lifting processor was implemented for Motion JPEG2000 using it. The implemented lifting kernel can accommodate the tile size of $1024{\times}1024$, and support both lossy compression using the (9,7) filter and lossless compression using (5,3) filter. Also, it has the same output rate as input rate, and can continuously output the wavelet coefficients of 4 types(LL, LH, HL, HH) at the same time. The implemented lifting processor completed a course of ASIC using $0.35{\mu}m$ CMOS library of SAMSUNG. It occupied about 90,000 gates, and stably operated in about 150MHz though difference from the used macro cell for the multiplier. Finally, the improved operated in about 150MHz though difference from the used macro cell for the multiplier. Finally, the performance can be identified in comparison with the previous researches and commercial IPs.
The purpose of this survey was to give data and information about type and needs of Home Physical Therapy, Visiting Physical Therapy and School Physical Therapy for physical and nurse. The subjects were 154(99 physical therapists and 55 nurses) who were working at geriatric rehabilitation hospitals and children hospitals. The period of questionary collection was from the 15 of August to the 15th of September 2011. And data was analysis from 99 articles such as journals related to physical therapy, and searched with keyword 'home and visiting physical therapy' by web site and Korea National Assembly Library from 1991 to 2011. The data was analysis with percentage, mean, standard deviation and ANOVA by SPSS PC 12.0. The results were as follows; 1. The definition of 'Home Physical Therapy' has been community based on physical therapy service for the patient who had diagnosis by medical doctor, has been based on medical law. The definition of 'Visiting Physical Therapy' has been community based on physical therapy service at home for the patient who had diagnosis by medical doctor, for the national basic living security, and senior citizen over 65 years who lives alone, has been based on law for community health and law of long term health insurance. The definition of 'School Physical Therapy' has been school based on physical therapy service at school after class for the disabled children who are studying at school, has been based on special education law article 28. 2. As for the knowledge of the Home and Visiting and School Physical Therapy, both groups PT and nurse were 'I do not know'125(81.3%) of the difference the concept of 3 definitions, so it means to need education and information about the different concept of three physical therapy. As for the needs of home and visiting physical therapy, both groups of PT and Nurse were 'needs' 151(98.1%). Physical therapist showed of 'Needs' on visiting physical therapy 35(35.4%), home physical therapy 32(32.3%), and schole physical therapy 32(32.3%). Nurse showed of 'Needs' on home physical therapy 23(41.8%). visiting physical therapy 19(34.5%), school physical therapy 13(23.6%). Therefore it is necessary to have home and visiting physical therapy as for the elderly and disabled person. 3. As for the qualification of Home and Visiting physical therapist, both PT and nurse groups showed as follows; take post graduation education program for home and visiting therapy after became PT : home physical therapist 108(70.1%), visiting physical therapist 106(68.8%). So it means education center or university can be developed post graduation program for home and visiting physical therapist. 4. As for the 'Needs' of school physical therapy, both groups of PT and nurse showed as follows; 'Needs' 142(92.2%), 'Needs superviser education program' 148(96.1%), in PT group showed 'I will participate of education program' 92(92.9%). 5. As for the present states of research papers or report of home, visiting, and school physical therapy was as follows; the 103 papers for 8 fields about' the needs of home and visiting physical therapy' from 1991 to 2011, the 13 papers for 2 fields about school physical therapy from 2001 to 2011, so total papers were 114 articles.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.